-
公开(公告)号:US11012862B2
公开(公告)日:2021-05-18
申请号:US16258544
申请日:2019-01-26
Applicant: Oracle International Corporation
Inventor: Kenny C. Gross , Ashin George , Guang C. Wang
IPC: H04L29/06 , G06F21/75 , H04W12/79 , H04W12/108
Abstract: The disclosed embodiments relate to a system that camouflages electromagnetic interference (EMI) fingerprints in EMI emissions from a computing system to enhance system security. During operation, the system monitors the EMI emissions from the computer system while the computer system is operating to produce corresponding EMI signals. Next, the system performs a Fast Fourier Transform (FFT) operation on the EMI signals. The system then converts an output of the FFT operation into a frequency-domain representation of the EMI signals. Next, the system generates a camouflaging signal based on the frequency-domain representation of the EMI signals. Finally, the system outputs the camouflaging signal through a transmitter to camouflage EMI fingerprints in the EMI emissions from the computer system.
-
公开(公告)号:US12219357B2
公开(公告)日:2025-02-04
申请号:US18590763
申请日:2024-02-28
Applicant: Cisco Technology, Inc.
Inventor: Jerome Henry , Robert E. Barton , Darryl E Sladden , Thomas Szigeti
IPC: H04W4/02 , H04W4/029 , H04W12/12 , H04W12/79 , H04W24/10 , H04W48/16 , H04W48/20 , H04W76/16 , H04W88/04 , H04W88/08 , H04W88/12 , H04W92/10 , H04W92/12
Abstract: Techniques and apparatus for managing a message relaying system are described. One technique includes an access point (AP) detecting a first signal and a second signal from a computing device. A validation of the first signal is performed based on parameters of the first signal and the second signal. After the validation, information associated with the first signal is transmitted to a computing system. In another technique, the computing system may designate one of multiple APs reporting information regarding first signals as a primary reporting AP and designate the remaining APs as secondary reporting APs. The computing system may instruct the secondary reporting APs to refrain from reporting information regarding first signals to the computing system.
-
公开(公告)号:US12218977B2
公开(公告)日:2025-02-04
申请号:US17721714
申请日:2022-04-15
Applicant: Sophos Limited
Inventor: John Edward Tyrone Shaw , Ross McKerchar , Moritz Daniel Grimm , Jan Karl Heinrich Weber , Shail R. Talati , Kenneth D. Ray , Andrew J. Thomas
Abstract: A threat management facility detects a device on an enterprise network and determines whether the device is one of a set of managed devices for the enterprise network. When the device is not one of the set of managed devices, the threat management facility may selectively direct the device to a portal that provides support to the user of the device while the device awaits admission to the enterprise network. As the user interacts with the portal, the portal may manage admission of unrecognized devices onto the enterprise network while making efficient use of network administrator resources.
-
公开(公告)号:US12156027B2
公开(公告)日:2024-11-26
申请号:US17749783
申请日:2022-05-20
Applicant: Robert Bosch GmbH
Inventor: Kubra Alemdar , Vivek Jain , Sushanta Mohan Rakshit
Abstract: Device fingerprinting is provided for ultra-wide band (UWB) communications. A wireless receiver receives wireless signals including an UWB packet sent from a transmitter. Channel impulse response (CIR) data is extracted from the UWB packet. A device fingerprint of the transmitter is created according to the CIR data, the device fingerprint being representative of physical properties of the wireless signals of the UWB packet. The transmitter is authenticated by the receiver based on the device fingerprint.
-
公开(公告)号:US20240348761A1
公开(公告)日:2024-10-17
申请号:US18748055
申请日:2024-06-19
Applicant: Frederic M Newman , Robert J Harter
Inventor: Frederic M Newman , Robert J Harter
IPC: H04N9/79 , G08B13/196 , H04W12/79
CPC classification number: H04N9/79 , G08B13/19619 , G08B13/19656 , G08B13/19671 , H04W12/79
Abstract: A home security camera system captures a picture of a visitor and detects information about the visitor's smartphone, thereby providing a two-part digital ID of the visitor. The two-part ID is particularly useful to law enforcement when the picture portion of the ID happens to be blurry or obstructed. In some examples, a packet scanner sniffs probe requests transmitted by the visitor's phone. The packet scanner can be an integral part of the camera or sold separately. To comply with privacy regulations and bypass obfuscation efforts, the system analyzes various characteristics (e.g., data content and arrangement) of the phone's probe requests, rather than having to discover the true MAC address. The system can notify a resident when a particular friend, mail carrier, or porch pirate returns. The system can share collected digital IDs with other community members to provide neighbors with advanced warnings when certain visitors are in the area.
-
公开(公告)号:US20240314554A1
公开(公告)日:2024-09-19
申请号:US18122942
申请日:2023-03-17
Applicant: Cisco Technology, Inc.
Inventor: Vishal Satyendra Desai , Shayne Miel , Ardalan Alizadeh
Abstract: This disclosure describes techniques for using an anchored endpoint to enhance MFA authentication of a client device. A method performed at least in part by a security service includes authenticating of a client device connecting to a secure resource. The method also includes determining a first Wi-Fi fingerprint of the client device, determining that the client device is within a threshold proximity to an anchor device, and determining a second Wi-Fi fingerprint of the anchor device. The method also includes detecting a change to the first Wi-Fi fingerprint of the client device and determining that the second Wi-Fi fingerprint of the anchor device has not changed. The method also includes determining whether the client device is within the threshold proximity of the anchor device, if it is, access to the secured resource continues to be allowed, if it is not, a reauthentication of the client device is triggered.
-
公开(公告)号:US12047166B1
公开(公告)日:2024-07-23
申请号:US17356684
申请日:2021-06-24
Applicant: UIPCO, LLC
Inventor: Yevgeniy Viatcheslavovich Khmelev , Christopher Russell , Gregory David Hansen , Nathan Lee Post , Ashley Raine Philbrick , Nolan Serrao , Ruthie D. Lyle , Pooja Krishnaswamy , Noemy Diosdado
IPC: H04K3/00 , G06F21/62 , H04W12/102 , H04W12/79 , H04W76/30
CPC classification number: H04K3/822 , G06F21/6263 , H04K3/825 , H04W12/102 , H04W12/79 , H04W76/30
Abstract: A method and system of protecting network activity of mobile devices is disclosed. Specifically, the methods and systems enable the detection of surveillance signals targeting or potentially targeting a user's personal device and automatically triggering a protective response to safeguard the user's information. The proposed systems can provide mobile device users with a powerful security capability by enabling their device to automatically disconnect from one or more networks and/or emitting a protective jamming signal in response to the detection of nearby potential surveillance activities.
-
公开(公告)号:US12035134B2
公开(公告)日:2024-07-09
申请号:US17126762
申请日:2019-06-19
Applicant: University of Notre Dame du Lac
Inventor: Thomas G. Pratt , Joseph Lawrence Loof , Eric Jesse
Abstract: Devices and techniques for authenticating wireless communications are disclosed. In some embodiments, the techniques can be performed by a network access point that includes a receiver to receive a wireless signal from a remote device. The network access point can also include a processor to calculate polarization data for the wireless signal and to determine whether the polarization data includes at least one characteristic that corresponds to a characteristic of a stored authenticated polarization signature.
-
公开(公告)号:US20240056818A1
公开(公告)日:2024-02-15
申请号:US17887847
申请日:2022-08-15
Applicant: Silicon Laboratories Inc.
Inventor: Guner Arslan
IPC: H04W12/122 , H04W12/79 , H04B1/00
CPC classification number: H04W12/122 , H04W12/79 , H04B1/001
Abstract: A system that is capable of detecting a Man in the Middle attack is disclosed. The system includes a receive circuit for receiving incoming packets. The system also includes a digitized model of at least part of the receive circuit and optionally part of the transmit circuit. The system compares the output from the digitized model with the output from the read circuit to determine the likelihood of a Man in the Middle Attack. In certain embodiments, the digitized model is a finite impulse response filter with multiple taps. The system correctly identifies Man in the Middle attacks more than 90% of the time when the signal to noise ratio is greater than 20 dB.
-
公开(公告)号:US20230188982A1
公开(公告)日:2023-06-15
申请号:US17550841
申请日:2021-12-14
Applicant: Intel Corporation
Abstract: A non-transitory computer-readable storage medium stores instructions to configure a base station for user equipment (UE) authentication in a wireless network and to cause the base station to perform an operation comprising decoding configuration signaling received from a PHY security function (PSF) of the wireless network. The configuration signaling includes a request for collection of a plurality of signal samples from the UE, the UE authenticated based on successful completion of a first authentication process. A response message is encoded for transmission to the PSF. The response message includes the plurality of UE signal samples. A trained machine learning model received from the PSF is decoded. The trained machine learning model associates the authenticated UE with an RF signature of the UE. The RF signature is based on the plurality of signal samples. A second authentication process of the UE is performed based on the trained model.
-
-
-
-
-
-
-
-
-